0% found this document useful (0 votes)
38 views4 pages

Ethicsin Information Technology APractical Guide

Uploaded by

Cak Hanep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views4 pages

Ethicsin Information Technology APractical Guide

Uploaded by

Cak Hanep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/378105622

Information Technology: A Practical Guide

Article in Technometrics · February 2024


DOI: 10.1080/00401706.2024.2307305

CITATIONS READS

0 848

2 authors, including:

Firdous Ahmad Mala


Higher Education Jammu & Kashmir
80 PUBLICATIONS 46 CITATIONS

SEE PROFILE

All content following this page was uploaded by Firdous Ahmad Mala on 10 February 2024.

The user has requested enhancement of the downloaded file.


Technometrics

ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/utch20

Ethics in Information Technology: A Practical Guide


G. K. Awari and Sarvesh V. Warjurkar, Boca Raton, FL: CRC Press, 2022, 213
pp., $53.59, ISBN 9781032163796

Firdous Ahmad Mala & Shahid Abdullah Dar

To cite this article: Firdous Ahmad Mala & Shahid Abdullah Dar (2024) Ethics in
Information Technology: A Practical Guide, Technometrics, 66:1, 132-133, DOI:
10.1080/00401706.2024.2307305

To link to this article: https://doi.org/10.1080/00401706.2024.2307305

Published online: 09 Feb 2024.

Submit your article to this journal

View related articles

View Crossmark data

Full Terms & Conditions of access and use can be found at


https://www.tandfonline.com/action/journalInformation?journalCode=utch20
132 BOOK REVIEWS

Shuangzhe Liu countries typically have higher standards. Economic cycles,


Faculty of Science and Technology, University of Canberra, natural disasters, and productivity are significant contributors.
Canberra, Australia Increased productivity, primarily driven by IT and innovation
shuangzhe.liu@canberra.edu.au in the business sector, has played a crucial role in raising living
standards. It’s important to emphasize that living standards
aren’t solely determined by economic factors like income;
they’re also shaped by elements such as health, education, and
Ethics in Information Technology: A Practical Guide, technological progress. Technology, particularly in the fourth
G. K. Awari and Sarvesh V. Warjurkar, Boca Raton, FL: CRC industrial revolution, has resulted in substantial enhancements
Press, 2022, 213 pp., $53.59, ISBN 9781032163796 in living conditions, providing connectivity, resource access,
and opportunities to underserved individuals. Productivity is
In this world of fast-changing technology and ubiquitous illu- a key factor in improving living standards, influencing both
sions, ethics and security pose as the most important challenges national economies and businesses. Technology, automation,
of all. Information technology is, on the one hand, equipping us and computerization are essential for boosting productivity
with unprecedented ease of access and comfort; on the other, it and labor efficiency, yielding considerable economic benefits.
is also making us more vulnerable than ever. The problems of Nonetheless, this implies that the use of vulnerable technologies
digital privacy and security breaches are real and rampant. This affects all aspects of human life and activities. Consequently,
is exactly when the issues of ethics and security in information ethical concerns in information technology are intricately linked
technology pop up as not just important concerns but immediate to human existence, growth, and progress.
and serious ones. Ethics in Information Technology: A Practical The world is currently experiencing a significant technolog-
Guide by Awari and Warjurkar attempts to address these very ical disparity known as the digital divide. This divide signifies
crucial issues. the gap in access to and utilization of digital technologies, par-
The book offers a comprehensive treatment of information ticularly the internet, among various demographic groups and
technology ethics, commencing with an exploration and exposi- regions. It is characterized by differences in internet connec-
tion of ethical principles. Ethics set societal standards for accept- tivity, digital literacy, and access to digital devices. While some
able behavior, universally condemning actions like lying and individuals and communities enjoy the benefits and information
stealing. However, the perception of ethical behavior, such as of the digital age, others face disadvantages, including limited
software piracy, varies by country (e.g., Vietnam with a 94% access to educational resources, job opportunities, and essential
piracy rate finds it more acceptable). Ethics is a part of philos- services. Bridging the digital divide is a vital global challenge
ophy, focusing on principles related to human conduct, encom- with substantial implications for social and economic equity.
passing the morality of actions and intentions. The importance Initiatives to address this issue encompass expanding inter-
of ethics is hard to overestimate. That is when we find that ethics net infrastructure, offering digital skills training, and ensuring
are more important than laws. affordable access for all, ultimately fostering a more inclusive and
Information technology is considered the world’s fastest- connected society.
growing and most diverse industry, and as such, ethical practices This text offers a comprehensive introduction to computer
in information technology are going to be increasingly signifi- and internet crime, ethics in information technology, and
cant and sought after. The authors recognize patience, effective privacy methods. It covers a range of key topics including
communication, dynamism, multitasking, problem-solving, and ethical decision-making, security breaches, theft identification,
enthusiasm as key parameters in an IT professional’s lifestyle. It consumer profiling strategies, intellectual property rights,
also emphasizes their responsibility to understand and follow quality in processes and products, software quality assurance,
a strict ethical code of conduct. This is precisely when an IT ethical organizational elements, telemedicine, and electronic
professional is required to possess, in addition to the mentioned health records. The book is designed to be a valuable resource for
traits, a deep sense of responsibility toward making digital sys- senior undergraduate and graduate students in interdisciplinary
tems and communication more robust and reliable. fields such as computer science, information technology,
The widespread use of online education systems poses electronics and communications engineering, and electrical
numerous challenges. While online teaching and learning offers engineering.
convenience, they also open the door to academic dishonesty In its seven chapters spanning just over 200 pages, the book
and unethical behavior, making the assessment process in delves into some of the most significant topics within the field
online education quite challenging. Although less severe than of information technology. These topics include a compre-
cybercrime, another key focus in this book, it is still highly hensive exploration of ethics, computer and internet ethics,
disruptive. Cybercrime encompasses various illicit activities organizational policies, the notion of intellectual property, IT
conducted on the Internet, using technology both as a weapon organizational ethics, and the influence of IT on our quality of
and a target. It includes actions like data theft, cyberbullying, life. Toward the end, the authors dedicate the final chapter to
and the distribution of viruses, leading to both financial and case studies, providing examples of security breaches, various
nonfinancial harm. While hacking for financial motives is a well- types of security breaches, and methods for preventing such
known example, digital fraud involving computers and networks breaches.
is also a prevalent form of cybercrime. Altogether, the book tackles a highly critical subject matter,
Living standards vary significantly between societies and making it a valuable and worthwhile read that justifies the time
nations, often measured by GDP per capita, where developed and effort invested in reading it.
TECHNOMETRICS 133

ORCID historical data, sequential multiple assignment randomization


Firdous Ahmad Mala http://orcid.org/0000-0003-2023-8529
trials, and joint models for longitudinal markers and clinical
outcomes.
Firdous Ahmad Mala Parts II–VI of the guidebooks cover the remaining portion.
Amar Singh College, Cluster University Srinagar, Jammu and Part II (Chapters 2–7) outlines the common results employed
Kashmir, India to investigate clinical questions and hypotheses in randomized
firdousmala@gmail.com controlled trials. It also discusses the statistical distributions
that are appropriate for the outcome measures of interest. These
Shahid Abdullah Dar outcomes lead to the formulation of statistical hypotheses,
Government Degree College Sopore, Jammu and Kashmir, the deployment of statistical analysis techniques to test these
India hypotheses, and the utilization of statistical models in the study
shahiddar514@gmail.com of statistical data. Chapter 2 will discuss statistical techniques
appropriate for dichotomous (qualitative) and ordinal data.
Chapter 3 will cover statistical techniques suitable for contin-
uous (quantitative) outcomes. Chapter 4 will explain statistical
techniques suitable for time-to-event outcomes subject to right
Handbook of Statistical Methods for Randomized censoring, commonly used in randomized controlled trials in
Controlled Trials, 1st ed., Edited by KyungMann Kim, chronic diseases. Chapter 5 will outline statistical techniques
Frank Bretz, Ying Kuen K. Cheung, and Lisa V. Hampson, suitable for count data. Chapter 6 will elaborate on statistical
New York: Chapman & Hall, 2023, 654 pp., £47.99 techniques suitable for longitudinal data. Lastly, Chapter 7 will
(paperback), ISBN 9781032009100 detail statistical techniques suitable for repeated event data. The
following are the outcomes often used in randomized controlled
The introduction of randomized controlled trials in the trials across many diseases and health situations: Part II provides
1940s and 1960s significantly contributed to advances in clinical a preliminary explanation of how to determine the required
medicine, including the screening, diagnosis, prevention, sample size and conduct a power analysis, which will be further
and treatment of health and wellbeing conditions. Edited by detailed in Part III.
KyungMann Kim, Frank Bretz, Ying Kuen K. Cheung, and Part III (Chapters 8–14) is all about getting randomized con-
Lisa V. Hampson, this book offers an in-depth treatment of trolled trials ready. It covers trial design, figuring out the sample
current statistical methods that are relevant to the planning, size, and power analysis based on the chosen primary endpoints.
monitoring, and analysis of clinical trials, with a specific focus In Part II, we previously explained these endpoints. Chapter 8
on randomized controlled trials. It talks about the history of will discuss cross-over design, which involves switching partici-
the topic, different ways to look at results, experimental designs, pants between different treatments or conditions. Chapter 9 will
figuring out sample sizes, interim analyses, and statistical issues cover factorial design, which examines the effects of multiple
such as multiple testing, subgroup analysis, competing risks, and independent variables on the dependent variable. Chapter 10
joint models. It also talks about topics like multiple assignment will explore cluster randomized design, an approach commonly
randomization trials, safety outcome analysis, non-inferiority used in health services research where groups or clusters ran-
trials, using historical data, and surrogate outcome validation. domly receive different interventions. Chapter 11 will explore
The handbook aims to serve as a reference text for individuals various methods of treatment allocation, including randomiza-
involved in design, monitoring, and analysis and can also func- tion, stratification, and outcome-adaptive allocation. Chapter 12
tion as a textbook for a graduate course in statistical methods will provide information on sample size estimation and power
for randomized controlled trials. The handbook acknowledges analysis for different types of data, including dichotomous, ordi-
the importance of randomized controlled trials in answering nal, continuous, and count data. Chapter 13 will discuss the
urgent clinical questions, particularly during the COVID-19 process of determining the appropriate sample size for time-
pandemic, and highlights the evolution of statistical methods for to-event data that is subject to right censoring. Chapter 14 will
design and analysis. The Handbook of Statistical Methods for focus on the estimation of sample size and power analysis for
Randomized Controlled Trials provides a comprehensive guide longitudinal data.
to statistical concepts essential for designing, monitoring, and Part IV (Chapters 15–17) provides a detailed account of the
analyzing clinical trials. monitoring process in randomized controlled trials. It covers
Part I RCTs, a type of clinical trial, have been around since topics such as data and safety monitoring, interim analysis,
the early 20th century, with the first modern trial being the strategies for early halting, sample size re-estimation, and adap-
British Medical Research Council’s Streptomycin Treatment of tive designs. Chapter 15 will discuss various techniques for con-
Pulmonary Tuberculosis trial. Modern trials in the United States ducting interim analyses, including group sequential methods,
began in the early 1960s, supported by the National Institutes triangular methods, and stochastic curtailment tests. Chapter
of Health and the 1962 Kefauver-Harris amendments to the 16 will focus on sample re-estimation during interim analyses.
Food, Drug, and Cosmetic Act of 1938. Statistical concepts are Lastly, Chapter 17 will provide an overview of adaptable designs.
fundamental to clinical trials, and their planning, monitoring, Part V (Chapter 18–21) covers practical and significant
and analysis involve a logical and sequential approach. To make matters in data analysis that extend beyond the scope of standard
statistical analysis more useful, we need to think about things statistical procedures discussed in Part II. Chapter 18 will
like competing risks, multiple testing, subgroup analyses, using address the issue of multiple tests resulting from the presence

View publication stats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy